A series of abductions involving cryptocurrency executives has caused new unique security measures.
As CNBC reported Saturday, June 7, among those who take additional precautions Didi TaihuttuHead of the so-called “Bitcoin family”. He told the network that he had revised all of the family security configuration following a series of threats.
According to the report, the taihuttus spent years on “the outer edge of the crypto ideology”, moving full time and remaining completely without bench.
In the past eight months, Didi Taihuttu said the family has put aside Material wallets And adopted a hybrid analog / digital system, using encrypted, divided and stored seed sentences, either via blockchain -based encryption services, or hidden on four continents.
“We have changed everything,” Taihuttu told CNBC. “Even if someone held me under the threat of a weapon, I cannot give them more than what is on my wallet on my phone. And that’s not much.”
The report noted that the family rethinks their exhibition in the middle of a series of attacks involving Crypto leaders. For example, one of the co-founders of the French portfolio company Ledger And his wife was kidnapped from their home in the center of France earlier this year in a ransom plot which also targeted another big book manager.
And in New York last month, a 28 -year -old tourist in Italy was allegedly removed and tortured for 17 days by attackers trying to access his Bitcoin password. The police said that the kidnappers shocked this man with sons, beat him with a pistol and tied an apple apple around his neck to monitor his movements.
In other news of crypto security, Pymnts recently wrote on the problems with which the industry is facing following the recent hack implying the exchange of crypto Jammingan incident which, depending on the company, could cost $ 400 million.
This incident, according to the report, highlights a deeper problem: even if the cryptographic assets themselves are secure, the data which surrounds them, such as user identities, metadata and documents at the level of the system, often have an underestimated value, in particular when it is also reconstructed.
“In this case, violation is the result of a Social engineering“” Randolph barrCiso of Cequence securitysaid Pymnts.
“There are standard approaches to combat such threats, including at least privileged access, separation of tasks and surveillance and alert on suspicious activities. Behavioral surveillance is another key area, and we will probably hear more about its role in future solutions and security controls. ”